OpenVPN 2.4.8 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Nov 1 2019
library versions: OpenSSL 1.1.1c FIPS 28 May 2019, LZO 2.08
Diffie-Hellman initialized with 2048 bit key
Failed to extract curve from certificate (UNDEF), using secp384r1 instead.
ECDH curve secp384r1 added
Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
TUN/TAP device tun0 opened
TUN/TAP TX queue length set to 100
/sbin/ip link set dev tun0 up mtu 1500
/sbin/ip addr add dev tun0 10.8.0.1/24 broadcast 10.8.0.255
Could not determine IPv4/IPv6 protocol. Using AF_INET
Socket Buffers: R=[212992->212992] S=[212992->212992]
UDPv4 link local (bound): [AF_INET]172.31.17.93:1194
UDPv4 link remote: [AF_UNSPEC]
GID set to nobody
UID set to nobody
MULTI: multi_init called, r=256 v=256
IFCONFIG POOL: base=10.8.0.2 size=252, ipv6=0
IFCONFIG POOL LIST
Initialization Sequence Completed
#ll | grep 00006684
drwxrwsr-x 2 f importfoto 4096 Dec 12 18:07 00006684/
#id m
uid=1002(m) gid=1002(m) groups=1002(m),1005(importfoto)
class version2 extends version1
let parseAsync = function(object) {
return new Promise(resolve => {
setTimeout(() => {
resolve(JSON.parse(JSON.stringify(object)));
})
})
}
https://stackoverflow.com/questions/7010830/bash-w...